Sciweavers

2421 search results - page 289 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
GLOBECOM
2008
IEEE
15 years 11 months ago
Collaborative Opportunistic Spectrum Access in the Presence of Multiple Transmitters
Abstract— We present a collaborative algorithm to enable opportunistic spectrum access for cognitive radios in the presence of multiple co-channel transmitters. A spectrum hole d...
Ahmed O. Nasif, Brian L. Mark
129
Voted
ICASSP
2008
IEEE
15 years 11 months ago
Adaptable K-nearest neighbor for image interpolation
A variant of the k-nearest neighbor algorithm is proposed for image interpolation. Instead of using a static volume or static k, the proposed algorithm determines a dynamic k that...
Kenta S. Ni, Truong Q. Nguyen
158
Voted
ICASSP
2008
IEEE
15 years 11 months ago
Corrected tandem features for acoustic model training
This paper describes a simple method for significantly improving Tandem features used to train acoustic models for large-vocabulary speech recognition. The linear activations at ...
Arlo Faria, Nelson Morgan
ICWMC
2006
IEEE
15 years 11 months ago
Base Station Assisted Hierarchical Cluster-Based Routing
Wireless sensor networks (WSNs) are commonly used for continuously monitoring applications. This paper investigates a base station assisted energy efficient routing for hierarchi...
Sajid Hussain, Abdul Wasey Matin
124
Voted
DFT
2005
IEEE
126views VLSI» more  DFT 2005»
15 years 10 months ago
Analysis and Testing for Error Tolerant Motion Estimation
We propose a novel system-level error tolerance approach specifically targeted for multimedia compression algorithms. In particular we focus on the motion estimation process perf...
Hyukjune Chung, Antonio Ortega